Sciweavers

326 search results - page 24 / 66
» Testing malware detectors
Sort
View
ICC
2009
IEEE
180views Communications» more  ICC 2009»
14 years 3 months ago
Composite Hypothesis Testing for Cooperative Spectrum Sensing in Cognitive Radio
—In this paper, we present a composite hypothesis testing approach for cooperative spectrum sensing. We derive the optimal likelihood ratio test (LRT) statistic based on the Neym...
Sepideh Zarrin, Teng Joon Lim
TRIDENTCOM
2008
IEEE
14 years 3 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
PAMI
2002
112views more  PAMI 2002»
13 years 8 months ago
Recognizing Handwritten Digits Using Hierarchical Products of Experts
The product of experts learning procedure [1] can discover a set of stochastic binary features that constitute a nonlinear generative model of handwritten images of digits. The qua...
Guy Mayraz, Geoffrey E. Hinton
SIGSOFT
2008
ACM
14 years 9 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
ASPLOS
2006
ACM
14 years 3 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...